-
Notifications
You must be signed in to change notification settings - Fork 4.7k
aws: Update EBS CSI driver to v1.47.0 #17552
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
/retest |
|
/override pull-kops-e2e-aws-upgrade-k132-ko132-to-klatest-kolatest-many-addons |
|
@hakman: Overrode contexts on behalf of hakman: pull-kops-e2e-aws-upgrade-k132-ko132-to-klatest-kolatest-many-addons In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
/test pull-kops-e2e-k8s-aws-amazonvpc |
|
/lgtm |
upup/models/cloudup/resources/addons/aws-ebs-csi-driver.addons.k8s.io/k8s-1.17.yaml.template
Outdated
Show resolved
Hide resolved
upup/models/cloudup/resources/addons/aws-ebs-csi-driver.addons.k8s.io/k8s-1.17.yaml.template
Outdated
Show resolved
Hide resolved
b3d61f0 to
b97df8d
Compare
| # --set sidecars.snapshotter.forceEnable=true \ | ||
| # --set controller.enableMetrics=true \ | ||
| # --no-hooks | grep -vi helm | ||
| #helm template aws-ebs-csi-driver aws-ebs-csi-driver/aws-ebs-csi-driver -n kube-system \ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we could make this easier for next time if we persisted the values overrides for the image registry:
| #helm template aws-ebs-csi-driver aws-ebs-csi-driver/aws-ebs-csi-driver -n kube-system \ | |
| #helm template aws-ebs-csi-driver aws-ebs-csi-driver/aws-ebs-csi-driver -n kube-system \ | |
| # --set image.repository=registry.k8s.io/provider-aws/aws-ebs-csi-driver \ | |
| # --set nodeDriverRegistrar.image.repository=registry.k8s.io/sig-storage/csi-node-driver-registrar \ |
etc.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not that much, they still add some eks-specific suffixes.... 😞
At least this way it's clear that it's totally different images.
|
I'm slightly concerned that the ECR image forks have significant changes from the registry.k8s.io images. ECR doesnt have node-driver-registrar v2.14.0, but comparing v2.13.0: I'm wondering if the ECR fork includes any changes that we need and would lose if we switch to registry.k8s.io. |
@torredil Any thoughts on this Q? Personally, I would prefer to stick with community images, if possible. |
You won't lose any functionality - we fully support using the community sidecar images( |
|
/override pull-kops-e2e-aws-upgrade-k132-ko132-to-klatest-kolatest-many-addons |
|
@hakman: Overrode contexts on behalf of hakman: pull-kops-e2e-aws-upgrade-k132-ko132-to-klatest-kolatest-many-addons, pull-kops-e2e-k8s-gce-cilium In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Ah, cool, thank you for the explanation @torredil! 🙂 |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: rifelpet The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
This also removes any dependency on the
public.ecr.awsregistry./cc @rifelpet @ameukam @torredil